Coupon Grab by ClipNCrazy.com Security & Risk Analysis

wordpress.org/plugins/coupon-grab

The Coupon Grab WordPress Plugin grabs printable coupons and will save them as draft, pending, private or publish them automatically to your blog.

10 active installs v1.2 PHP + WP 3.2.1+ Updated Jan 17, 2012
autobloggingcouponcouponingcouponsfeed
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Coupon Grab by ClipNCrazy.com Safe to Use in 2026?

Generally Safe

Score 85/100

Coupon Grab by ClipNCrazy.com has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The coupon-grab v1.2 plugin exhibits a mixed security posture. On the positive side, it shows no known CVEs and a low number of potential entry points. The code also largely utilizes prepared statements for SQL queries, which is a good practice. However, significant concerns arise from the static analysis. The fact that 100% of output is not properly escaped is a critical weakness, potentially leading to Cross-Site Scripting (XSS) vulnerabilities. Furthermore, all three taint analysis flows identified unsanitized paths, indicating potential risks if these paths are reachable by user input. The complete absence of nonce checks and capability checks is also highly concerning, especially given the presence of cron events that might perform sensitive actions without proper authorization.

Key Concerns

  • Unescaped output
  • Taint flows with unsanitized paths
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Coupon Grab by ClipNCrazy.com Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Coupon Grab by ClipNCrazy.com Release Timeline

v1.2Current
v1.1
v1.0
Code Analysis
Analyzed Mar 16, 2026

Coupon Grab by ClipNCrazy.com Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
8 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
3
External Requests
0
Bundled Libraries
0

SQL Query Safety

89% prepared9 total queries

Output Escaping

0% escaped2 total outputs
Data Flows · Security
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
general (coupongrab.php:300)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Coupon Grab by ClipNCrazy.com Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionfeed_couponscoupongrab.php:34
actioncfeed_check_cronmailercoupongrab.php:35
filtercron_schedulescoupongrab.php:36
actionadmin_menucoupongrab.php:287
actionexpire_couponsinclude\Expire_Coupon.php:16

Scheduled Events 5

feed_coupons
feed_coupons
feed_coupons
feed_coupons
expire_coupons
Maintenance & Trust

Coupon Grab by ClipNCrazy.com Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedJan 17, 2012
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Coupon Grab by ClipNCrazy.com Developer Profile

Nick Powers

3 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Coupon Grab by ClipNCrazy.com

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/coupon-grab/css/coupon-grab.css/wp-content/plugins/coupon-grab/js/coupon-grab.js
Script Paths
/wp-content/plugins/coupon-grab/js/coupon-grab.js
Version Parameters
coupon-grab/css/coupon-grab.css?ver=coupon-grab/js/coupon-grab.js?ver=

HTML / DOM Fingerprints

CSS Classes
coupon-grab
Data Attributes
data-coupon-iddata-coupon-linkdata-coupon-descriptiondata-coupon-branddata-coupon-majcatdata-coupon-mincat+3 more
JS Globals
couponGrabcoupon_grab_settings
Shortcode Output
<!-- Coupon Grab Shortcode Start --><!-- Coupon Grab Shortcode End -->
FAQ

Frequently Asked Questions about Coupon Grab by ClipNCrazy.com